PROCEDURE AND ARCHITECTURE FOR THE PROTECTION OF REAL TIME DATA
First Claim
1. A method for safeguarding authenticity, integrity and confidentiality of real-time data in a distributed real-time system, comprising a plurality of computers, whereby each computer can periodically send real-time messages with real-time data to the other computers, and whereby one computer takes over the role of a security server, and another computer assumes the role of a certification authority that establishes the authenticity of the public key of a computer, and where all computers have access on a common sparse time base, and where each computer has at least one private asymmetric key available for creation of a signature that is required for checking the authenticity and integrity of the signed data structure, which can be requested from the certification authority.whereina secure startup protocol with a long asymmetric key pair is processed with the certification authority immediately after power-up of a computer, and where short asymmetric key pairs are used for safeguarding the authenticity and integrity of the real-time data in real-time operation after the end of the startup phase, whereby the key pairs are changed frequently, and whereby confidentiality is ensured with asymmetric key pairs based on the secured authenticity and integrity of the data, whereby the length of the key used depends on the period of time during which the confidentiality of the real-time data must be ensured.
2 Assignments
0 Petitions
Accused Products
Abstract
The object of the present invention is to safeguard the authenticity and integrity of real-time data in a distributed real-time computer system. The present invention considers other requirements of real-time data processing, such as the timeliness of real-time data transmission and limited resource availability. Frequent modification of an asymmetric key pair hinders intruders from cracking a key before its validity has expired. The present method can also be extended to safeguard the confidentiality of real-time data. It can be implemented efficiently on a multiprocessor system-on-chip (MPSoC).
30 Citations
18 Claims
-
1. A method for safeguarding authenticity, integrity and confidentiality of real-time data in a distributed real-time system, comprising a plurality of computers, whereby each computer can periodically send real-time messages with real-time data to the other computers, and whereby one computer takes over the role of a security server, and another computer assumes the role of a certification authority that establishes the authenticity of the public key of a computer, and where all computers have access on a common sparse time base, and where each computer has at least one private asymmetric key available for creation of a signature that is required for checking the authenticity and integrity of the signed data structure, which can be requested from the certification authority.
wherein a secure startup protocol with a long asymmetric key pair is processed with the certification authority immediately after power-up of a computer, and where short asymmetric key pairs are used for safeguarding the authenticity and integrity of the real-time data in real-time operation after the end of the startup phase, whereby the key pairs are changed frequently, and whereby confidentiality is ensured with asymmetric key pairs based on the secured authenticity and integrity of the data, whereby the length of the key used depends on the period of time during which the confidentiality of the real-time data must be ensured.
-
13. A distributed real-time system comprising a plurality of computers that are linked to a central switch and where each computer can send periodic real-time messages with real-time data to the other computers, and where a distinction is made between sensitive and non-sensitive real-time messages, and where the sensitive real-time messages that contain sensitive real-time data are recognized through an a priori specified identification in the data field, and where all computers have access to a common sparse time base and where each computer is provided with a minimum of one private asymmetric key for creating a signature for a data structure, and where the key for checking the signature is known to the public,
wherein the switch sends all sensitive real-time messages, in addition to the recipients mentioned therein, to a specified computer, the so-called security server.
Specification